Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.
Mold The Resident acknowledges that to avoid mold growth it is important to prevent excessive moisture buildup and agrees to remove visible moisture accumulation as soon as it occurs and immediately report to Owner any evidence of excess moisture or mold or mildew inside the Home. Resident acknowledges receipt of the “Mold Information and Prevention Addendum”, which is fully executed and incorporated herein by reference.
Vegetation No trees or other vegetation may be removed from the site without prior approval from the Town, except in accordance with Section 4 above and pursuant to the Annual Plan.
FABRICATION Making up data or results and recording or reporting them.
Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.
TREE TRIMMING The Licensee shall have authority to trim trees upon and overhanging public streets, alleys, sidewalks and ways and places of the Town so as to prevent the branches of such trees from coming in contact with the wires, cables and equipment of the Licensee, in accordance with applicable state law and any Town bylaws/ordinances and regulations.
Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.
Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins.